Public bug reported:

Binary package hint: squid

Dear colleagues,

squid-2.X and squid-3.x are vulnerable.

Message from NVD:

The "cache update reply processing" functionality in Squid 2.x before
2.6.STABLE17 and Squid 3.0 allows remote attackers to cause a denial of
service (crash) via unknown vectors related to HTTP headers.

This applies to all squid packages in our supported releases.

Severity: (from upstream: http://www.squid-
cache.org/Advisories/SQUID-2007_2.txt)

This problem allows any client trusted to use the service to
 perform a denial of service attack on the Squid service.

** Affects: squid (Ubuntu)
     Importance: Undecided
         Status: New

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2007-6239

** Description changed:

  Binary package hint: squid
  
  Dear colleagues,
  
  squid-2.X and squid-3.x are vulnerable.
  
  Message from NVD:
  
  The "cache update reply processing" functionality in Squid 2.x before
  2.6.STABLE17 and Squid 3.0 allows remote attackers to cause a denial of
  service (crash) via unknown vectors related to HTTP headers.
  
  This applies to all squid packages in our supported releases.
+ 
+ Severity: (from upstream: http://www.squid-
+ cache.org/Advisories/SQUID-2007_2.txt)
+ 
+ This problem allows any client trusted to use the service to
+  perform a denial of service attack on the Squid service.

** Visibility changed to: Public

-- 
[CVE-2007-6239] squid-2.X and squid-3.x are vulnerable
https://bugs.launchpad.net/bugs/174352
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to